TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

LibreSSL, and the new libtls API

185 pointsby glass-over 9 years ago

10 comments

neoCrimeLabsover 9 years ago
I remember so many people in the open source world angry or annoyed with the OpenBSD team for forking LibreSSL. The fact is it&#x27;s more than a year later, several more high-risk vulnerabilities discovered, and OpenSSL has yet to make any noticable changes. Meanwhile those same vulnerabilities were fixed in LibreSSL due to code cleanup and removal.[1]<p>No matter how you feel about the forking or the openbsd team, there is something to be learned here. There are times when forking, deleting old code, and major clean-ups can be very useful strategies. Sunk cost bias can be an enemy of progress.<p>[1] - <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;LibreSSL#Security_and_vulnerabilities" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;LibreSSL#Security_and_vulnerab...</a>
评论 #10320204 未加载
评论 #10320183 未加载
aleccoover 9 years ago
Not to miss:<p>Less code <a href="http:&#x2F;&#x2F;www.openbsd.org&#x2F;papers&#x2F;libtls-fsec-2015&#x2F;mgp00004.html" rel="nofollow">http:&#x2F;&#x2F;www.openbsd.org&#x2F;papers&#x2F;libtls-fsec-2015&#x2F;mgp00004.html</a><p>What&#x27;s wrong with the OpenSSL API <a href="http:&#x2F;&#x2F;www.openbsd.org&#x2F;papers&#x2F;libtls-fsec-2015&#x2F;mgp00007.html" rel="nofollow">http:&#x2F;&#x2F;www.openbsd.org&#x2F;papers&#x2F;libtls-fsec-2015&#x2F;mgp00007.html</a><p>TLS small set of functions <a href="http:&#x2F;&#x2F;www.openbsd.org&#x2F;papers&#x2F;libtls-fsec-2015&#x2F;mgp00009.html" rel="nofollow">http:&#x2F;&#x2F;www.openbsd.org&#x2F;papers&#x2F;libtls-fsec-2015&#x2F;mgp00009.html</a><p>read() and write() semantics <a href="http:&#x2F;&#x2F;www.openbsd.org&#x2F;papers&#x2F;libtls-fsec-2015&#x2F;mgp00011.html" rel="nofollow">http:&#x2F;&#x2F;www.openbsd.org&#x2F;papers&#x2F;libtls-fsec-2015&#x2F;mgp00011.html</a><p>No need for handling errno EAGAIN&#x2F;EINTR yay! <a href="http:&#x2F;&#x2F;www.openbsd.org&#x2F;papers&#x2F;libtls-fsec-2015&#x2F;mgp00016.html" rel="nofollow">http:&#x2F;&#x2F;www.openbsd.org&#x2F;papers&#x2F;libtls-fsec-2015&#x2F;mgp00016.html</a><p>There&#x27;s more stuff like event&#x2F;poll, but I don&#x27;t want to link more. The presentation is very interesting.
评论 #10321073 未加载
评论 #10321065 未加载
sbuttgereitover 9 years ago
I&#x27;m just curious and,yes, it&#x27;s a bit off-topic AND forgetting the relevant dates, etc. that are at play here: isn&#x27;t developing an SSL&#x2F;TLS library the sort of thing that Rust should excel at? I see all those lines of C code (and clearly other non-C code) and am thinking of all the opportunities for bugs to come up related to pointer and memory management. Would such a library be a good use of Rust from the performance and safety perspective? Seems like it&#x27;s how the language is being sold.<p>Note: I&#x27;m not a C developer nor do I typically work at this level of the stack, thus my seeking opinions.
评论 #10320552 未加载
评论 #10322397 未加载
评论 #10320499 未加载
btraskover 9 years ago
Thanks to the developers for LibreSSL and libtls. I&#x27;m using both in an application I&#x27;m working on.<p>I&#x27;ve been meaning to post on the mailing list, but I have some requests I guess I&#x27;ll try here:<p>- For libtls, accept custom read and write callbacks. libuv has no way to poll for writable: <a href="https:&#x2F;&#x2F;github.com&#x2F;libuv&#x2F;libuv&#x2F;issues&#x2F;517" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;libuv&#x2F;libuv&#x2F;issues&#x2F;517</a><p>- I wish they would provide (and maintain) the modern cyphersuite from here: <a href="https:&#x2F;&#x2F;wiki.mozilla.org&#x2F;Security&#x2F;Server_Side_TLS" rel="nofollow">https:&#x2F;&#x2F;wiki.mozilla.org&#x2F;Security&#x2F;Server_Side_TLS</a> (&quot;secure&quot;, &quot;legacy&quot; and &quot;high&quot; are all lacking in various ways)<p>These are fairly minor issues and overall LibreSSL and (especially) libtls have been a huge step forward. Thanks again.
评论 #10325751 未加载
throwaway2048over 9 years ago
Arch Linux has not switched to libreSSL I suspect this might have been a tounge slip of alpine linux, which has.
评论 #10323379 未加载
nailerover 9 years ago
For those on OS X, `brew install libressl`. Note the actual binary is still called `openssl`, but you can tell because it&#x27;s half the size.
评论 #10319952 未加载
评论 #10320043 未加载
kzrdudeover 9 years ago
Is there a saner version of the slides, a PDF, or something with less jpg?
ausjkeover 9 years ago
I&#x27;m interested in this but it&#x27;s in lack of documentation, worse than openssl at the moment.<p>for example any demo code for me to try out the libtls?
评论 #10320511 未加载
pjmlpover 9 years ago
Nice slides, but I would have liked to see how they are making sure there are no memory corruption issues.
评论 #10322913 未加载
davidgerardover 9 years ago
Any chance of getting this into Debian?